CVE-2024-1536

7.4 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to inject malicious scripts into pages using the Essential Addons for Elementor plugin's event calendar widget. The scripts are stored and execute whenever other users view the compromised pages, enabling persistent cross-site scripting attacks. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Essential Addons for Elementor WordPress plugin
Versions: All versions up to and including 5.9.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with the Essential Addons for Elementor plugin installed and the event calendar widget in use.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface websites, redirect users to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Malicious actors inject scripts to steal user cookies/sessions, display fraudulent content, or redirect users to phishing pages.

🟢

If Mitigated

With proper user role management and content review, impact is limited to potential defacement or minor script injection on non-critical pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires contributor-level WordPress access. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.10

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Essential Addons for Elementor'. 4. Click 'Update Now' if available, or download version 5.9.10+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable Event Calendar Widget

all

Temporarily disable the vulnerable event calendar widget until patching is possible.

Restrict Contributor Permissions

all

Temporarily remove contributor-level users or restrict their publishing capabilities.

🧯 If You Can't Patch

  • Implement strict content review process for all contributor submissions
  • Install and configure a Web Application Firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Essential Addons for Elementor → Version. If version is 5.9.9 or lower, you are vulnerable.

Check Version:

wp plugin list --name='essential-addons-for-elementor' --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 5.9.10 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to event calendar endpoints
  • Multiple content updates from contributor accounts
  • Script tags containing event calendar attributes in page content

Network Indicators:

  • Unexpected JavaScript execution on pages containing event calendar widgets
  • External resource loads from event calendar content

SIEM Query:

source="wordpress" AND (event_type="plugin_update" AND plugin_name="essential-addons-for-elementor" AND version<="5.9.9") OR (event_type="content_update" AND user_role="contributor" AND content LIKE "%event-calendar%")

🔗 References

📤 Share & Export